Guest

Cisco Catalyst 6000 Series Switches

Password Recovery Procedure for the Catalyst 6500/6000 LANE Module

Cisco - Password Recovery Procedure for the Catalyst 6500/6000 LANE Module

Document ID: 14983

Updated: Nov 16, 2007

   Print

Introduction

This document describes how to recover a password on a Cisco Catalyst 6500/6000 LAN emulation (LANE) module. The document addresses these modules:

  • Catalyst 6500 OC-12 ATM LANE (single-mode fiber [SMF]) module (part number: WS-X6101-OC12-SMF)

  • Catalyst 6500 OC-12 ATM LANE (multimode fiber [MMF]) module (part number: WS-X6101-OC12-MMF)

Prerequisites

Requirements

For this procedure, you need a straight cable (instead of the classic, fully crossed cable).

caution Caution: The password recovery procedure of the Catalyst 6500/6000 LANE module breaks with the latest software revision (which, at the time of the initial publication of this document, is Cisco IOS® Software Release 12.1(4)E2). Refer to Cisco bug ID CSCdt05579 (registered customers only) for detailed bug information.

Conventions

For more information on document conventions, refer to Cisco Technical Tips Conventions.

Step-by-Step Procedure

This document describes the password recovery procedure on a Catalyst 6500/6000 Supervisor Engine with Catalyst OS (CatOS) software version 6.1 (1b) and on a Cisco ATM LANE module with Cisco IOS Software Release 12.0(5)XS1.

  1. Attach a terminal or PC with terminal emulation to the console port of the ATM LANE module.

    Use these terminal settings:

    9600 baud rate
    No parity
    8 data bits 
    1 stop bit 
    No flow control 
    
  2. Issue the show version command and record the setting of the configuration register.

    The Example of Password Recovery Procedure section of the document Password Recovery Procedure for the Cisco 1600 Series Routers provides output of a show version command. The configuration register setting is usually 0x2101 or 0x101.

  3. Go to the Supervisor Engine of the Catalyst 6500/6000 and issue the reset modnr command.

  4. Press Break on the terminal keyboard within 10 seconds of the power up to put the module into ROM monitor (ROMmon).

    If the break sequence does not work, refer to Standard Break Key Sequence Combinations During Password Recovery for other key combinations.

  5. Issue the confreg 0x2142 command at the rommon 1> prompt to boot from Flash without loading the configuration.

  6. Issue the reset command at the rommon 2> prompt.

    The module reboots, but ignores the saved configuration.

  7. As these questions appear on the screen, enter the responses that appear here in boldface:

    1. Would you like to enter the initial configuration dialog? yes

    2. Would you like to enter basic management setup? no

    3. Would you like to see the current interface setup? no

    4. Enter host name: host name

    5. Enter enable secret: the new password

    6. Enter password: password

    7. Enter virtual terminal password: password

      Note: This is where you enter the new password that gets encrypted.

    8. Configure SNMP Network Management? no

      Note: If you do not specify an enable secret password, type no encryption.

    9. Enter no until you get a menu where you can choose to save your configuration.

    10. Enter 2 to save the configuration.

  8. Issue the enable command at the ATM> prompt.

  9. Enter your new password.

    You are in enable mode and see the ATM# prompt.

  10. Issue the copy start running command to copy the NVRAM into memory.

    Do not issue the configure terminal command.

  11. Issue the write terminal command or the show running command.

  12. Issue the configure terminal command and make the changes.

    The prompt is now hostname(config)#.

  13. Issue the config-register 0x2102 command, or the value that you recorded in Step 2.

  14. Press Ctrl-Z to leave the configuration mode.

    The prompt is now hostname#.

  15. Issue the write command to commit the changes.

  16. Issue the reload command to restart with the new configuration register.

Related Information

Updated: Nov 16, 2007
Document ID: 14983